001390337 000__ 12146nam\a2200589\i\4500 001390337 001__ 1390337 001390337 003__ DLC 001390337 005__ 20220420003052.0 001390337 006__ m\\\\\o\\d\\\\\\\\ 001390337 007__ cr\un\nnnunnun 001390337 008__ 210824t20222022njua\\\\ob\\\\001\0\eng\d 001390337 010__ $$a 2021040690 001390337 020__ $$a9781119682554$$q(electronic book) 001390337 020__ $$a111968255X$$q(electronic book) 001390337 020__ $$a9781119682530$$q(electronic book) 001390337 020__ $$a1119682533$$q(electronic book) 001390337 020__ $$a9781119682523$$q(electronic book) 001390337 020__ $$a1119682525$$q(electronic book) 001390337 020__ $$z9781119682509 001390337 0247_ $$a10.1002/9781119682554$$2doi 001390337 040__ $$aNhCcYBP$$cNhCcYBP 001390337 042__ $$apcc 001390337 050_4 $$aTK5105.5956$$b.S63 2022 001390337 08200 $$a004.6$$223 001390337 24500 $$aSmart and sustainable approaches for optimizing performance of wireless networks :$$breal-time applications /$$cedited by Sherin Zafar, Mohd Abdul Ahad, Syed Imran Ali, Deepa Mehta, M. Afshar Alam. 001390337 264_1 $$aHoboken, NJ :$$bJohn Wiley & Sons, Inc.,$$c2022. 001390337 264_4 $$c©2022 001390337 300__ $$a1 online resource :$$billustrations. 001390337 336__ $$atext$$btxt$$2rdacontent 001390337 337__ $$acomputer$$bc$$2rdamedia 001390337 338__ $$aonline resource$$bcr$$2rdacarrier 001390337 504__ $$aIncludes bibliographical references and index. 001390337 5050_ $$a1 Analysis and Clustering of Sensor Recorded Data to Determine Sensors Consuming the Least Energy Prashant Abbi, Khushi Arora, Praveen Kumar Gupta, K.B. Ashwini, V. Chayapathy, and M.J. Vidya -- 1.1 Importance of Low Energy Consumption Sensors -- 1.2 Methodology: Clustering Using K Means and Classification Using KNN -- 1.3 Objective Realization and Result of Analysis -- 1.4 Introduction -- 1.5 Working of WSNs and Sensor Nodes -- 1.6 Classification of WSNs -- 1.6.1 Benefits and Drawbacks of Centralized Techniques -- 1.6.2 Benefits and Drawbacks of Distributed Techniques -- 1.7 Security Issues -- 1.7.1 Layering of Level Based Security -- 1.8 Energy Consumption Issues -- 1.9 Commonly Used Standards and Protocols for WSNs -- 1.9.1 Slotted Protocols -- 1.9.1.1 Time Division Multiple Access -- 1.9.1.2 Zig Bee/801.15.4 -- 1.9.1.3 Sensor Medium Access Control -- 1.10 Effects of Temperature and Humidity on the Energy of WSNs -- 1.10.1 Effects of Temperature on Signal Strength -- 1.10.2 Effects of Humidity on Signal Strength -- 1.10.3 Temperature Vs. Humidity -- 1.11 Proposed Methodology -- 1.11.1 Information Gathering and Analysis -- 1.11.2 System Design and Implementation -- 1.11.3 Testing and Evaluation -- 1.12 Conclusion -- References -- 2 Impact of Artificial Intelligence in Designing of 5G K. Maheswari, Mohankumar, and Banuroopa -- 2.1 5G - An Introduction -- 2.1.1 Industry Applications -- 2.1.2 Healthcare -- 2.1.3 Retail -- 2.1.4 Agriculture -- 2.1.5 Manufacturing -- 2.1.6 Logistics -- 2.1.7 Sustainability of 5G Networks -- 2.1.8 Implementation of 5G -- 2.1.9 Architecture of 5G Technology -- 2.2 5G and AI -- 2.2.1 Gaming and Virtual Reality -- 2.3 AI and 5G -- 2.3.1 Continuous Learning AI Model -- 2.4 Challenges and Roadmap -- 2.4.1 Technical Issues -- 2.4.2 Technology Roadmap -- 2.4.3 Deployment Roadmap -- 2.5 Mathematical Models -- 2.5.1 The Insights of Mathematical Modeling in 5G Networks -- 2.6 Conclusion -- References -- 3 Sustainable Paradigm for Computing the Security of Wireless Internet of Things: Blockchain Technology Sana Zeba, Mohammed Amjad, and Danish Raza Rizvi -- 3.1 Introduction -- 3.2 Research Background -- 3.2.1 The Internet of Things -- 3.2.1.1 Security Requirements in Wireless IoT -- 3.2.1.2 Layered Architecture of Wireless IoT -- 3.2.2 Blockchain Technology -- 3.2.2.1 Types of Blockchain -- 3.2.2.2 Integration of Blockchain with Wireless Internet of Things -- 3.3 Related Work -- 3.3.1 Security Issues in Wireless IoT System -- 3.3.2 Solutions of Wireless IoT Security Problem -- 3.4 Research Methodology -- 3.5 Comparison of Various Existing Solutions -- 3.6 Discussion of Research Questions -- 3.7 Future Scope of Blockchain in IoT -- 3.8 Conclusion -- References -- 4 Cognitive IoT Based Health Monitoring Scheme Using Non-Orthogonal MultipleAccess Ashiqur Rahman Rahul, Saifur Rahman Sabuj, Majumder Fazle Haider, andShakil Ahmed -- 4.1 Introduction -- 4.2 Related Work -- 4.3 System Model and Implementation -- 4.3.1 Network Description -- 4.3.2 Sensing and Transmission Analysis -- 4.3.3 Pathloss Model -- 4.3.4 Mathematical Model Evaluation -- 4.3.4.1 Effectual Throughput -- 4.3.4.2 Interference Throughput -- 4.3.4.3 Energy Efficiency -- 4.3.4.4 Optimum Power -- 4.3.4.4.1 Optimum Power Derivation for HRC -- 4.2.3.4.2 Optimum Power Derivation for MRC -- 4.4 Simulation Results -- 4.5 Conclusion -- 4.A Appendices -- 4.A.1 Proof of Optimum Power Transmission for HRC Device at EffectualState (z = 0) -- 4.A.2 Proof of Optimum Power Transmission for HRC Device inInterference State (z = 1) -- 4.A.3 Proof of Optimum Power Transmission for MRC Device at EffectualState (z = 0) -- 4.A.4 Proof of Optimum Power Transmission for MRC Device inInterference State (z = 1) -- References -- 5 Overview of Resource Management for Wireless Adhoc Network Mehajabeen Fatima and Afreen Khueaheed -- 5.1 Introduction -- 5.1.1 Wired and Wireless Network Design Approach -- 5.1.2 History -- 5.1.3 Spectrum of Wireless Adhoc Network -- 5.1.4 Enabling and Networking Technologies -- 5.1.5 Taxonomy of Wireless Adhoc Network (WANET) -- 5.2 Mobile Adhoc Network (MANET) -- 5.2.1 Introduction to MANET -- 5.2.2 Common Characteristics of MANET -- 5.2.3 Advantages and Disadvantages -- 5.2.4 Applications of MANET -- 5.2.5 Major Issues of MANET -- 5.3 Vehicular Adhoc Network (VANET) -- 5.3.1 Introduction of VANET -- 5.3.2 Common Features of VANET -- 5.3.3 Pros, Cons, Applications -- 5.4 Wireless Mesh Network (WMN) -- 5.4.1 Preface of WMN -- 5.4.2 Common Traits of WMN -- 5.4.3 WMN Has Many Open Issues and Research Challenges -- 5.4.4 Performance Metrics -- 5.4.5 Advantages and Disadvantages -- 5.4.6 Prominent Areas and Challenges of WMN -- 5.5 Wireless Sensor Network (WSN) -- 5.5.1 Overview of WSN -- 5.5.2 Common Properties of WSN -- 5.5.3 Benefits, Harms, and Usage of WSN -- 5.6 Intelligent Management in WANET -- 5.6.1 Major Issues of WANET -- 5.6.2 Challenges of MAC Protocols -- 5.6.3 Routing Protocols -- 5.6.3.1 Challenges of Routing Protocols -- 5.6.3.1.1 Scalability -- 5.6.3.1.2 Quality of Service -- 5.6.3.1.3 Security -- 5.6.4 Energy and Battery Management -- 5.7 Future Research Directions -- 5.8 Conclusion -- References -- 6 Survey: Brain Tumor Detection Using MRI Image with Deep Learning Techniques Chalapathiraju Kanumuri and C.H. Renu Madhavi -- 6.1 Introduction -- 6.2 Background -- 6.2.1 Types of Medical Imaging -- 6.2.2 M. R. Imaging as a Modality -- 6.2.3 Types of Brain Tumor M. R. Imaging Modalities -- 6.2.4 Suitable Technologies Before Machine Learning -- 6.2.5 MRI Brain Image Segmentation -- 6.3 Related Work -- 6.4 Gaps and Observations -- 6.5 Suggestions -- 6.6 Conclusion -- References -- 7 Challenges, Standards, and Solutions for Secure and Intelligent 5G Internet of Things (IoT) Scenarios Ayasha Malik and Bharat Bhushan -- 7.1 Introduction -- 7.2 Safety in Wireless Networks: Since 1G to 4G -- 7.2.1 Safety in Non-IP Networks -- 7.2.2 Safety in 3G -- 7.2.3 Security in 4G -- 7.2.4 Security in 5G -- 7.2.4.1 Flashy System Traffic and Radio Visual Security Keys -- 7.2.4.2 Authorized Network Security and Compliance with Subscriber Level Safety Policies -- 7.2.5 Security in 5G and Beyond -- 7.3 IoT Background and Requirements -- 7.3.1 IoT and Its Characteristics -- 7.3.2 Characteristics of IoT Infrastructure -- 7.3.3 Characteristics of IoT Applications -- 7.3.4 Expected Benefits of IoT Adoption for Organization -- 7.3.4.1 Benefits Correlated to Big Data Created by IoT -- 7.3.4.2 Benefits Interrelated to the Openness of IoT -- 7.3.4.3 BenefitsRelated to the Linked Aspect6 of IoT -- 7.4 Non 5G Standards Supporting IoT -- 7.4.1 Bluetooth Low Energy -- 7.4.2 IEEE 802.15.4 -- 7.4.3 LoRa -- 7.4.4 Sigfox -- 7.4.5. 001390337 5050_ $$aWiFi HaLow -- 7.5 5 G Advanced Security Model -- 7.5.1 Confidentiality -- 7.5.2 Integrity -- 7.5.3 Accessibility -- 7.5.4 Integrated Safety Rule -- 7.5.5 Visibility -- 7.6 Safety Challenges and Resolution of Three-Tiers Structure of 5G Networks -- 7.6.1 Heterogeneous Access Networks -- 7.6.1.1 Safety Challengers -- 7.6.1.2 Safety Resolutions -- 7.6.2 Backhaul Networks -- 7.6.2.1 Safety Challenges -- 7.6.2.2 Safety Resolutions -- 7.6.3 Core Network -- 7.6.3.1 Safety Challenges -- 7.6.3.2 Safety Resolutions -- 7.7 Conclusion and Future Research Directions -- References -- 8 Blockchain Assisted Secure Data Sharing in Intelligent Transportation Systems Gujkan Madaan, Avinash Kumar, and Bharat Bhushan -- 8.1 Introduction -- 8.2 Intelligent Transport System -- 8.2.1 ITS Overview -- 8.2.2 Issues in ITS -- 8.2.3 ITS Role in IoT -- 8.3 Blockchain Technology -- 8.3.1 Overview -- 8.3.2 Types of Blockchain -- 8.3.2.1 Public Blockchain -- 8.3.2.3 Private Blockchain -- 8.2.3.2 Federated Blockchain -- 8.3.3 Consensus Mechanism -- 8.3.3.1 Proof of Work -- 8.3.3.2 Proof of Stake -- 8.3.3.3 Delegated Proof of Stake -- 8.3.3.4 Practical Byzantine Fault Tolerance -- 8.3.3.5 Casper -- 8.3.3.6 Ripple -- 8.3.3.7 Proof of Activity -- 8.3.4 Cryptography -- 8.3.5 Data Management and Its Structure -- 8.4 Blockchain Assisted Intelligent Transportation System -- 8.4.1 Security and Privacy -- 8.4.2 Blockchain and Its Application foe Improving Security and Privacy -- 8.4.3 ITS Based on Blockchain -- 8.4.4 Recent Advancement -- 8.5 Future Research Perspectives -- 8.5.1 Electric Vehicle Recharging -- 8.5.2 Smart City Enabling and Smart Vehicle Security -- 8.5.3 Deferentially-Privacy Preserving Solutions -- 8.5.4 Distribution of Economic Profits and Incentives -- 8.6 Conclusion -- References -- 9 Utilization of Agro Waste for Energy Engineering Applications: Toward the Manufacturing of Batteries and Super Capacitors S.N. Kumar, S. Akhil, R.P. Nishita, O. Lijo Joseph, Aju Matthew George, and I Christina Jane -- 9.1 Introduction -- 9.2 Super Capacitors and Electrode Materials -- 9.2.1 Energy Density -- 9.3 Related Works in the Utilization of Agro Waste for Energy EngineeringApplications -- 9.4 Inferences from Work Related with Utilization of Coconut. Rice Husk, andPineapple Waste for Fabrication of Super Capacitor -- 9.5 Factors Contributing in the Fabrication of Super Capacitor from Agro Waste -- 9.6 Conclusion -- Acknowledgment -- References -- 10 Computational Intelligence Techiques for Optimization in Networks Ashu Gautam and Rashima Mahajan -- 10.1 Introduction Focussing on Pedagogy of Impending Approach -- 10.1.1 Security Challenge in Networks -- 10.1.2 Attacks Vulnerability in Complex Networks -- 10.2 Relevant Analysis -- 10.3 Broad Area of Research -- 10.3.1 Routing Protocols -- 10.3.2 Hybrid Protocols -- 10.4 Problem Identification -- 10.5 Objectives of the Study -- 10.6 Methodology to be Adopted -- 10.7 Proposed/Expected Outcome of the Research -- References -- 11 R&D Export and ICT Regimes in India Zeba -- 11.1 Introduction -- 11.2 Artificial Intelligence: the ... 001390337 506__ $$aAccess limited to authorized users 001390337 533__ $$aElectronic reproduction.$$bAnn Arbor, MI$$nAvailable via World Wide Web. 001390337 588__ $$aDescription based on online resource; title from digital title page (viewed on April 04, 2022). 001390337 650_0 $$aNetwork performance (Telecommunication) 001390337 650_0 $$a5G mobile communication systems. 001390337 655_0 $$aElectronic books 001390337 7001_ $$aZafar, Sherin,$$eeditor. 001390337 7001_ $$aAhad, Mohd Abdul,$$eeditor. 001390337 7001_ $$aAli, Syed Imran,$$eeditor. 001390337 7001_ $$aMehta, Deepa,$$d1981-$$eeditor. 001390337 7001_ $$aAlam, Mohd Afshar,$$eeditor. 001390337 7102_ $$aProQuest (Firm) 001390337 77608 $$iPrint version:$$tSmart and sustainable approaches for optimizing performance of wireless networks$$dHoboken, NJ : Wiley, 2022$$z9781119682509$$w(DLC) 2021040689 001390337 852__ $$bebk 001390337 85640 $$3GOBI DDA$$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=6876111$$zOnline Access 001390337 909CO $$ooai:library.usi.edu:1390337$$pGLOBAL_SET 001390337 980__ $$aBIB 001390337 980__ $$aEBOOK 001390337 982__ $$aEbook 001390337 983__ $$aOnline